Since Dell holds a ton of government contracts and a good amount of government computers are Dell, you can guarantee they most DEFINITELY "give a shit" about this.
This is why I have an issue with Project Zero. You will NEVER patch all the 0days. There are only a few bugs that I've seen that were so impactful (Heartbleed for example) that it made a massive impact to release and patch it. And as you implied, patching an 0day often publicizes a new vulnerable attack surface with new bugs to follow.
The real way to fix security issues isn't to find new exploits and expose them. It's to architect new ways to prevent whole families of exploits from being possible. I've only really seen Project Zero do one sort of recommendation in this way. Outside of that, I don't feel that them finding 0days and releasing them is actually a significant improvement on security because they aren't even close to plugging all of the holes (or even enough to really make a difference).
You're stating that the organization "as a whole" is "blatantly" violating the Constitution. Don't you see why your statement is being challenged? It's largely baseless. At most, a small number of programs that the NSA has used have been shown to maybe be unconstitutional.
The documents regarding that incident were pulled from an Inspector General's folder regarding an open investigation. That hadn't shown themselves to be anything. They were actively looking in to the incident. If anything Manning tainted the investigation and may have even prevented justice from being served.
There is a difference between releasing data that is strictly related to the public interest and taking massive amounts of data, including information about very sensitive operations and diplomatic discussions and releasing them without regards to the damage they may cause. It's reckless.
Fox? He used the Constitution to definite the terms. Are you arguing against the Constitutional definition of what a traitor is? What definition would you want him tried on in court if not the Constitutional one?
VMWare. It takes advantage of the fact that VMWare links guest VMs to the host's printers by default and takes advantage of that link. The patch from VMWare even applied to VMWare Fusion even though there hasn't been anything published on getting this to work in OSX.
Wait... you believe that the NSA is easier to compromise than the computers of reporters from multiple international news agencies with various levels of computer security policies and knowledge?
I'll let Schneier answer that, in case you didn't read the article:
> The open question is which countries have sophisticated enough cyberespionage operations to mount a successful attack against one of the journalists or against the intelligence agencies themselves. And while I have my own mental list, the truth is that I don’t know. But certainly Russia and China are on the list, and it’s just as certain they didn’t have to wait for Snowden to get access to the files.